[{"data":1,"prerenderedAt":517},["ShallowReactive",2],{"navigation_docs":3,"-getting-started-quickstart":125,"-getting-started-quickstart-surround":512},[4,28,62,94,100],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Borgata Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"The Hit","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"Laundering","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"id":126,"title":18,"body":127,"description":505,"extension":506,"links":507,"meta":508,"navigation":509,"path":19,"seo":510,"stem":20,"__hash__":511},"docs/1.getting-started/quickstart.md",{"type":128,"value":129,"toc":494},"minimark",[130,134,138,152,157,160,166,178,182,185,209,217,221,228,235,239,246,263,271,278,282,289,303,306,310,313,331,335,338,352,359,363,366,482,489],[131,132,18],"h1",{"id":133},"quickstart-your-first-heist",[135,136,137],"p",{},"This guide walks you through a complete Heist cycle — the Gangsta way to build a feature. By the end, you'll understand how the 6 phases work together and why structured development beats ad-hoc coding.",[139,140,142,146,147,151],"callout",{"icon":27,"type":141},"info",[143,144,145],"strong",{},"Before you start:"," Make sure you've ",[148,149,150],"a",{"href":14},"installed Gangsta"," and verified the installation works.",[153,154,156],"h2",{"id":155},"step-1-express-your-intent","Step 1: Express Your Intent",[135,158,159],{},"Start a fresh session with your AI tool and tell it what you want to build:",[161,162,163],"blockquote",{},[135,164,165],{},"\"I want to add a user authentication system to my app\"",[135,167,168,169,172,173,177],{},"That's it. The ",[143,170,171],{},"1% Rule"," kicks in automatically — the agent recognizes this as a \"build something new\" intent and invokes ",[174,175,176],"code",{},"gangsta:reconnaissance",".",[153,179,181],{"id":180},"step-2-reconnaissance","Step 2: Reconnaissance",[135,183,184],{},"The agent deploys its intel-gathering skills:",[186,187,188,192,195,202],"ul",{},[189,190,191],"li",{},"Scans your codebase for existing patterns, dependencies, and architecture",[189,193,194],{},"Identifies relevant files, conventions, and constraints",[189,196,197,198,201],{},"Produces a ",[143,199,200],{},"Dossier"," — a structured report of findings",[189,203,204,205,208],{},"Asks you to ",[143,206,207],{},"approve the Dossier"," before proceeding",[139,210,213,216],{"icon":211,"type":212},"i-lucide-shield","warning",[143,214,215],{},"Phase Gate:"," You must approve the Dossier. If the intel is incomplete, ask for more reconnaissance before moving on.",[153,218,220],{"id":219},"step-3-the-grilling","Step 3: The Grilling",[135,222,223,224,227],{},"The agent runs an ",[143,225,226],{},"adversarial debate"," — a Proposer argues for the best approach while a Devil's Advocate challenges every assumption. This surfaces edge cases, risks, and trade-offs you might miss in a single-pass design.",[135,229,230,231,234],{},"Output: ",[143,232,233],{},"Grilling Conclusions"," documenting the winning approach and rejected alternatives.",[153,236,238],{"id":237},"step-4-the-sit-down","Step 4: The Sit-Down",[135,240,241,242,245],{},"Now the agent drafts the ",[143,243,244],{},"Contract"," — a formal specification document:",[186,247,248,251,254,257,260],{},[189,249,250],{},"What will be built (scope)",[189,252,253],{},"What won't be built (out of scope)",[189,255,256],{},"Acceptance criteria",[189,258,259],{},"Architectural decisions",[189,261,262],{},"Applicable constitution rules",[139,264,267,270],{"icon":265,"type":266},"i-lucide-ban","danger",[143,268,269],{},"No code allowed."," The Sit-Down is purely about specification. If any code appears, the phase must restart.",[135,272,273,274,277],{},"You review and ",[143,275,276],{},"sign the Contract"," — this is the law that governs all subsequent implementation.",[153,279,281],{"id":280},"step-5-resource-development","Step 5: Resource Development",[135,283,284,285,288],{},"The agent decomposes the Contract into a ",[143,286,287],{},"War Plan",":",[186,290,291,294,297,300],{},[189,292,293],{},"Breaks work into parallel task packages",[189,295,296],{},"Assigns territories (domains of responsibility)",[189,298,299],{},"Allocates resources and subagents",[189,301,302],{},"Identifies dependencies between tasks",[135,304,305],{},"You approve the War Plan, and execution begins.",[153,307,309],{"id":308},"step-6-the-hit","Step 6: The Hit",[135,311,312],{},"Soldier subagents execute the War Plan in parallel:",[186,314,315,318,325,328],{},[189,316,317],{},"Each soldier implements their assigned tasks",[189,319,320,321,324],{},"Test-Driven Development (",[174,322,323],{},"gangsta:drill-tdd",") enforces Red-Green-Refactor",[189,326,327],{},"Budget tributes are tracked per task",[189,329,330],{},"Code respects the Contract — deviations require a spec revision",[153,332,334],{"id":333},"step-7-laundering","Step 7: Laundering",[135,336,337],{},"The Consigliere reviews all deliverables:",[186,339,340,343,346,349],{},[189,341,342],{},"Code review against the Contract",[189,344,345],{},"Integration testing",[189,347,348],{},"The Ledger is updated with insights and fails",[189,350,351],{},"Production-ready code is delivered",[139,353,356,358],{"icon":354,"type":355},"i-lucide-check-circle","success",[143,357,215],{}," You declare the Heist complete. The feature is spec'd, built, verified, and documented.",[153,360,362],{"id":361},"the-full-pipeline","The Full Pipeline",[135,364,365],{},"Here's what your first Heist looks like end-to-end:",[367,368,369,388],"table",{},[370,371,372],"thead",{},[373,374,375,379,382,385],"tr",{},[376,377,378],"th",{},"Phase",[376,380,381],{},"Skill",[376,383,384],{},"You Do",[376,386,387],{},"Output",[389,390,391,406,421,436,452,467],"tbody",{},[373,392,393,396,400,403],{},[394,395,71],"td",{},[394,397,398],{},[174,399,176],{},[394,401,402],{},"Approve Dossier",[394,404,405],{},"Intel report",[373,407,408,410,415,418],{},[394,409,75],{},[394,411,412],{},[174,413,414],{},"gangsta:the-grilling",[394,416,417],{},"Approve Consensus",[394,419,420],{},"Design decisions",[373,422,423,425,430,433],{},[394,424,79],{},[394,426,427],{},[174,428,429],{},"gangsta:the-sit-down",[394,431,432],{},"Sign Contract",[394,434,435],{},"Specification",[373,437,438,441,446,449],{},[394,439,440],{},"Resource Dev",[394,442,443],{},[174,444,445],{},"gangsta:resource-development",[394,447,448],{},"Approve War Plan",[394,450,451],{},"Task breakdown",[373,453,454,456,461,464],{},[394,455,87],{},[394,457,458],{},[174,459,460],{},"gangsta:the-hit",[394,462,463],{},"Approve Completion",[394,465,466],{},"Working code",[373,468,469,471,476,479],{},[394,470,91],{},[394,472,473],{},[174,474,475],{},"gangsta:laundering",[394,477,478],{},"Declare Complete",[394,480,481],{},"Clean delivery",[139,483,485,488],{"icon":484,"type":141},"i-lucide-external-link",[143,486,487],{},"Deep dive:"," Read the full Heist Pipeline documentation for detailed checklists, gate conditions, and phase-specific processes.",[135,490,491],{},[148,492,493],{"href":65},"Continue to the Heist Pipeline →",{"title":495,"searchDepth":16,"depth":16,"links":496},"",[497,498,499,500,501,502,503,504],{"id":155,"depth":16,"text":156},{"id":180,"depth":16,"text":181},{"id":219,"depth":16,"text":220},{"id":237,"depth":16,"text":238},{"id":280,"depth":16,"text":281},{"id":308,"depth":16,"text":309},{"id":333,"depth":16,"text":334},{"id":361,"depth":16,"text":362},"Walk through your first Gangsta Heist cycle from start to finish.","md",null,{},{"order":21},{"title":18,"description":505},"q5S8tiDjlj7eVFTLWofODW1K9Y0XL3hiK-Me9MVDvJU",[513,515],{"title":13,"path":14,"stem":15,"description":514,"order":16,"children":-1},"Install Gangsta skills on your preferred AI development platform.",{"title":23,"path":24,"stem":25,"description":516,"order":26,"children":-1},"The core behavioral rule of Gangsta — if there's even a 1% chance a skill applies, you must invoke it.",1776282625801]